Sciweavers

32117 search results - page 6 / 6424
» Design for Unanticipated Use..
Sort
View
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
14 years 18 days ago
XCS for robust automatic target recognition
A primary strength of the XCS approach is its ability to create maximally accurate general rules. In automatic target recognition (ATR) there is a need for robust performance beyo...
B. Ravichandran, Avinash Gandhe, Robert E. Smith
HICSS
2003
IEEE
260views Biometrics» more  HICSS 2003»
14 years 11 days ago
Automating Land Management: An Interpretive Analysis of Information Technology Management within the Bureau of Land Management
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...
John C. Beachboard
ASPLOS
2009
ACM
14 years 7 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
SENSYS
2009
ACM
14 years 1 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
FTCS
1993
111views more  FTCS 1993»
13 years 8 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski